Mary Theofanos and Yasemin Acar
Welcome to USEC
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreMacOS versus Microsoft Windows: A Study on the Cybersecurity...
Cem Topcuoglu (Northeastern University), Andrea Martinez (Florida International University), Abbas Acar (Florida International University), Selcuk Uluagac (Florida International University), Engin Kirda (Northeastern University)
Read MoreLocation Data and COVID-19 Contact Tracing: How Data Privacy...
Callie Monroe, Faiza Tazi, Sanchari Das (university of Denver)
Read More“So I Sold My Soul“: Effects of Dark Patterns...
Oksana Kulyk (ITU Copenhagen), Willard Rafnsson (IT University of Copenhagen), Ida Marie Borberg, Rene Hougard Pedersen
Read More